Encryption protocols need to be engineered so as to be efficient and scalable for deployment on large-scale Internet of Things (IoT) systems and devices with limited computational resources. Devices of the IoT are resource constrained, and therefore, traditional security mechanisms are not precise in smart things. IoT is focusing on machine-to-machine mode of communication. For such communication nodes, authentication is very important for insuring security and privacy. The main IoT security concerns are authentication, authorization, integrity, confidentiality, non-repudiation, availability, and privacy. As the volume of IoT devices connecting and disconnecting from the network continues to escalate, access control solutions need to be able to do this at digital speeds. The state-of-the-art authentication protocols for radio frequency identification systems include various categories of solutions such as mechanisms built up on public key cryptography or other mechanism to provide security at low cost by using simpler techniques to ensure tag security.